2.7 - Mobile Device Security Flashcards
1
Q
Screen locks
A
- Restrict access to the device
– You’re going to leave it somewhere - Facial recognition
– Unlock with your face - PIN
– Choose a personal identification number - Fingerprint
– Built-in fingerprint reader - Swipe
– Choose a pattern - Failed attempts
– iOS: Erase everything after 10 failed attempts
– Android: Lock the device and require a
Google login or wipe the device
2
Q
Locator applications and remote wipe
A
- Built-in GPS
– And location “helpers” - Find your phone
– On a map. - Control from afar
– Make a sound
– Display a message - Wipe everything
– At least your data is safe
3
Q
Patching/OS updates
A
- All devices need updates - Even mobile devices
- Device patches - Security updates
- Operating system updates
– New features, bug fixes - Don’t get behind!
– Avoid security problems
4
Q
Full device encryption
A
- Encrypt all device data
– Phone keeps the key - iOS 8 and later
– Personal data is encrypted with your passcode - Android
– Version 5.0 and later is probably already encrypted
5
Q
Remote backup
A
- Difficult to backup something that’s always moving
– Backup to the cloud - Constant backup
– No manual process - Backup without wires
– Use the existing network - Restore with one click
– Restores everything
– Authenticate and wait
6
Q
Anti-virus and anti-malware
A
- Apple iOS
– Closed environment, tightly regulated
– Malware has to find a vulnerability - Android
– More open, apps can be installed from anywhere
– Easier for malware to find its way in - Apps run in a “sandbox”
– You control what data an app can view - Third-party virus and malware protection
– Available from the usual providers
7
Q
Firewalls
A
- Mobile phones don’t include a firewall
– Most activity initiates outbound, not inbound - Some mobile firewall apps are available
– Most for Android
– None seem to be widely used - Enterprise environments can control mobile apps
– Firewalls can allow or disallow access
8
Q
Policies and procedures
A
- Manage company-owned and user-owned
mobile devices
– BYOD - Bring Your Own Device - Centralized management of the mobile devices
– Specialized functionality /
Mobile Device Manager (MDM) - Set policies on apps, data, camera, etc.
– Control the remote device
– The entire device or a “partition” - Manage access control
– Force screen locks and PINs on these single user devices
9
Q
IoT (Internet of Things)
A
- Sensors - Heating and cooling, lighting
- Smart devices - Home automation, video doorbells
- Wearable technology - Watches, health monitors
- Facility automation - Temperature, air quality, lighting
- Weak defaults
– IoT manufacturers are not security professionals
– Consider isolating IoT devices on their own network